home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cs.utexas.edu!zaphod.mps.ohio-state.edu!caen!destroyer!cs.ubc.ca!unixg.ubc.ca!unruh
- From: unruh@physics.ubc.ca (William Unruh)
- Newsgroups: comp.security.misc
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Date: 24 Nov 1992 02:16:57 GMT
- Organization: The University of British Columbia
- Lines: 19
- Distribution: world
- Message-ID: <1es3apINNkub@iskut.ucs.ubc.ca>
- References: <1992Nov12.084549.5128@unix.brighton.ac.uk> <1992Nov23.003157.1@vxcrna.cern.ch>
- NNTP-Posting-Host: physics.ubc.ca
-
- zeus@vxcrna.cern.ch writes:
-
- >Any company that uses a braindead operating system that makes passwords readable
- >in encrypted form in the first place is braindead.
-
-
- >In the real world computers have to be built for pinheads. People
- >who try to sell a product that requires intelligence to operate it
- >are not going to sell much.
-
- The design of the Unix password was deliberately open so people wouldn't
- think they were safe ( eg using cat as a password) when they were not.
- Yes it is time that a new password algorithm were produced tha cannot be
- cracked as "easily" as the unix one, but hiding the passwords isn't the
- answer. ( so someone getws ahold of one of your backup tapes and there
- are the passwords in all their (encrypted) glory- then what do you do.
- And if you want the computer designed for pinheads, they are presumably
- precisely the ones who would let someone get a copy of their backup
- tape.
-